A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to captcha bypass, which can be abused by an attacker to brute force user credentials. An attacker can send a series of HTTP requests to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-0435 A login attempt restriction bypass vulnerability exists in the checkLoginAttempts functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to captcha bypass, which can be abused by an attacker to brute force user credentials. An attacker can send a series of HTTP requests to trigger this vulnerability.
Github GHSA Github GHSA GHSA-v977-h4hm-rrff WWBN AVideo Improper Restriction of Excessive Authentication Attempts vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 19:30:00 +0000


Tue, 17 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2025-11-04T18:19:47.767Z

Reserved: 2023-12-06T18:48:58.247Z

Link: CVE-2023-49810

cve-icon Vulnrichment

Updated: 2025-11-04T18:19:47.767Z

cve-icon NVD

Status : Modified

Published: 2024-01-10T16:15:48.803

Modified: 2025-11-04T19:16:09.927

Link: CVE-2023-49810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.